Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 25
Generated: 20:48:30
Hey there 👋 The last two months? Busy. Productive. A little intense (in the best way). We shipped major updates, refactored deep under the hood, and launched a protocol that’s been in the works for a while. Plus, we got a wave of real-world feedback. some of it stung, all of it helped. Exactly what we needed. Let’s break it down. 📦 Two big releases: built on real feedback - v0.1.4 (The Punch-In-The-Face Update) We dropped 0.1.4 at the end of September: a release that marked a turning point. After 0.1.3 hit the wild, users gave us real, raw feedback. And we listened. Hard. At the heart of this release was a major overhaul of the core Rust crate. We refactored big chunks of the backend to align with a new API, which yes, meant rewriting a lot of stuff. But the result? Smoother, faster, and a lot more solid. v0.1.4 Highlights: 🔧 Stability upgrades: reworked relay connections, event processing, and group logic. 🚀 Performance boosts: reduced lag, faster responses. ✨ UX polish: drafts now save securely. Chats scroll like they’re supposed to. “Start New Chat” got a facelift. 🧼 Visual tweaks: cleaner UI, skeleton loaders, bottom sheets with silky animations. 📱 Better support: Android v7a builds for older devices. Versioned binaries + SHA-256 hashes for the careful types. Prepping for v0.2.0 ( We're Not Slowing Down) After 0.1.4, we kept the momentum. A bunch of exciting things are landing: 🖼️ Image support: encrypted media sharing via the brand new MIP-04 spec. 🔔 Local notifications (Android-first): fully private, device-side alerts. No servers involved. You get notified, your privacy stays intact. 🙋‍♂️ UX enhancements: avatars in group chats. Smarter notifications. 🌍 Global ready: Multi-language support: English, German, Spanish, French, Italian, Portuguese, Russian, Turkish. 🧑‍🤝‍🧑 Group Power-Ups: add people to existing groups without losing encryption guarantees. - 🦫 Say Hi to MARMOT PROTOCOL Now, here’s the big one: Marmot. Yeah, we launched a protocol. It’s native to Nostr, built from scratch, and (not to brag) it’s a game-changer for secure group messaging. What makes Marmot different? Marmot combines MLS (Messaging Layer Security) with Nostr’s decentralized architecture. That means: 🔒 True End-to-End encryption: only you and your people can read your messages. 🌐 No central servers: no single point of failure. Or censorship. 🕵️‍♂️ Metadata protection: not just the message, it hides who you’re talking to. 🧢 Identity flexibility: No phone numbers. No emails. Just your keys. 🔥 Censorship resistance: if one relay goes down, another steps in. MIP-04 (Secure Media, Done Right). It lets you share images and files securely in Marmot groups. Here’s what’s under the hood: 🔐 ChaCha20-Poly1305 AEAD encryption 🗂️ Content stored via content-addressed systems like Blossom 🔁 Forward secrecy & post-compromise security ✅ Integrity checks to make sure no one’s tampering ❤️ We don’t just slap features together… we design them to last. 🎤 On the Global Stage In case you missed it: nostr:nprofile1qqspwwwexlwgcrrnwz4zwkze8rq3ncjug8mvgsd96dxx6wzs8ccndmcpzamhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuegpzamhxue69uhkummnw3ezu6rpwd5xyctwvuhxumq47j9et and nostr:nprofile1qqst0mtgkp3du662ztj3l4fgts0purksu5fgek5n4vgmg9gt2hkn9lqpypmhxue69uhkummnw3ezuetfde6kuer6wasku7nfvuh8xurpvdjj7qghwaehxw309aex2mrp0yhxz7n6v9kk7tnwv46z7pxxtmh hit the stage at the Lugano Plan B Forum, talking about privacy, Bitcoin, and how to build messaging that actually respects you. (Spoiler: people listened.) 🚧 What’s next Marmot is still in development( experimental but promising). The cryptography is solid, and we’re iterating fast. New release in COMING SOON, and real-world testing is shaping every release. Follow us for new updates! image
2025-11-06 15:26:45 from 1 relay(s) 13 replies ↓
Login to reply

Replies (25)

This is the kind of cypherpunk project (from 21F contributor nostr:nprofile1qqst0mtgkp3du662ztj3l4fgts0purksu5fgek5n4vgmg9gt2hkn9lqppemhxue69uhkummn9ekx7mp0qys8wumn8ghj7mn0wd68ytn9d9h82mny0fmkzmn6d9njuumsv93k2tct43vxq) that makes us think privacy can win. Follow along. Get the app from nostr:nprofile1qqs83nn04fezvsu89p8xg7axjwye2u67errat3dx2um725fs7qnrqlgzqtdq0 nostr:nevent1qqs8kvxvj2un99g39daafkvnhtr3hdlflkvnm2txrxaeyn3emlmarcqpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgq3qwhtn0s68y3cs98zysa4nxrfzss5g5snhndv35tk5m2sudsr7ltmsxpqqqqqqzxlevya
2025-11-06 15:37:20 from 1 relay(s) ↑ Parent Reply
Been running 0.1.4 for several weeks now, but I have never been able to send any messages. I can see my list of Nostr contacts, but when I select a contact and tap “Start Chat”, I receive the error messages “Something went wrong. Please try again.” or “Failed to share invite”. I would like to resolve this issue. Is there a community forum where I can get help?
2025-11-06 17:13:34 from 1 relay(s) ↑ Parent 2 replies ↓ Reply
Hey! We’re aware of that issue in 0.1.4 and will be addressed in the next release coming soon. In the meantime, you can reach us directly for help from within the app: go to New Chat > Help and Feedback. that opens a chat with White Noise support. Appreciate your patience, and thanks for testing things early. ❤️
2025-11-06 17:19:58 from 1 relay(s) ↑ Parent Reply
One thing to try in the meantime is to have the person you’re trying to add go to the developer settings and delete all their key packages and then publish a new one. This is a common issue.
2025-11-06 21:15:36 from 1 relay(s) ↑ Parent Reply
How does it fade against SimpleX? What are strength and weaknesses of each approach? How does metadata protection work vs Simplex? When will we see full i2p integration, something that really would create a difference to all the other clearnet approaches?
2025-11-06 21:35:13 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
because it on nostr its security guarentees are similar to Simplex, no? most people use the default relays, but it's trivial to use your own. you can spin up a new identity trustlessly. in theory, the relays have little-to-no knowledge into the source and destination of messages. generally similar security guarentees, no?
2025-11-07 01:48:29 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
I don’t understand all the tech referenced, so I’ve got some learning to do, but either way, this is just the kind of update I LOVE to see Building Testing Trying to Iterating All upon solid ethical foundations for privacy, censorship-resistance, and an openness to innovation Go nostr:npub1zuuajd7u3sx8xu92yav9jwxpr839cs0kc3q6t56vd5u9q033xmhsk6c2uc nostr:nevent1qqs8kvxvj2un99g39daafkvnhtr3hdlflkvnm2txrxaeyn3emlmarcqpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgew0z8f
2025-11-07 02:22:35 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
I know that SimpleX spent quite some time at designing its metadata protection protocol. So I currently have doubts that other projects have looked at it with the same depth. It's something to easily fuck up or have wrong assumptions.
2025-11-07 08:37:30 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
So - I wouldn't say that we're yet at the level of SimpleX - it's been in the works for much longer and you're right, they go to very extensive lengths to hide metadata. The goal for nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq3wamnwvaz7tmjv4kxz7fwwpexjmtpdshxuet59uqzqawhxlp5wfr3q2wyfpmtxvxj9ppg3fp80x6erghdfk4pcmq8a7hhwp9puf is to get that far for sure though. Like nostr:nprofile1qythwumn8ghj7enfd36x2u3wdehhxarj9emkjmn9qyg8wumn8ghj7mn0wd68ytnvv9hxgqpqlxzaxzge0jq9u9cecucctdt5lslwgp7hcxmp2l0wn8r2ecjenwasfxlphq said, you can already create as many accounts on White Noise that you want - using throwaway keys/identities if you'd like. We'll definitely be adding tor (and maybe i2p or ohttp) support next year too. What relays can see at the moment is limited to: 1. A group with a given group_id value exists. (relay doesn't know how many people are in the group or who the people are - relay can see a relative amount of activity is all, e.g. are there lots of messages or few). These group_ids can rotate for each group AND groups can run multiple group_ids simultaneously to obfuscate that relative amount of activity too. 2. A given pubkey is enable to chat using the Marmot protocol (which is our protocol that underlies White Noise but can be used by any Nostr client). e.g. that a given user has a key package published. That's all.
2025-11-07 10:53:01 from 1 relay(s) ↑ Parent Reply
Are beavers and marmots compatible? Cause she’s so cute… I now believe in love at first nostr sight. nostr:nevent1qqs8kvxvj2un99g39daafkvnhtr3hdlflkvnm2txrxaeyn3emlmarcqpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgew0z8f
2025-11-10 13:07:35 from 1 relay(s) ↑ Parent Reply
Impressive work. Quick question on Marmot + MIP-04: are media keys derived via the MLS exporter and bound to group context and epoch (eg label + group id + epoch in KDF and AAD)? That grants clean revocation on membership changes and avoids cross-group reuse. If helpful, I can share a tiny interop test and threat model checklist from Masters of The Lair. How are you handling this today?
2025-11-10 20:47:45 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
That’s exactly right. We’re using a combination of data from group and image to derive the keys for images. I’d be super interested in your test and learnings though. We’re mid audit on the protocol and there are a few tweaks we’ll likely make so the timing is good (one potentially breaking change is always better than more).
2025-11-11 06:41:04 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
Perfect. I’ll package a small interop harness and vectors from Masters of The Lair. Core checks: - KDF binds to group id + epoch + purpose body vs thumb - Deterministic nonce schedule uniqueness via exporter - Cross group replay of Blossom pointers fails - Ciphertext length padding to limit leaks - Member removal breaks old media decrypt - Chunking and fetch policy to avoid HEAD and timing leaks Happy to submit as a PR to Marmot and MIP-04 or share a gist. What’s your preferred route?
2025-11-11 16:02:20 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
Great. I’ll send two PRs from Masters of The Lair: interop harness with JSON vectors and Rust tests, and a leak profile doc with a CI job. Target main or dev, and is MIT or Apache-2 fine for the vectors? First PR by Friday.
2025-11-12 15:06:38 from 1 relay(s) ↑ Parent Reply